Icf 8 4th Quarter
Icf 8 4th Quarter
1. What type of software is used to search information over the internet by matching keywords over search terms?
a. Browser b. Search Engine c. Mozilla d. Internet Explorer
2. Which one is not a search engine?
a. Google b. Safari c. Yahoo d. Bing
3. Which criteria in evaluating information talks about the author’s agenda or objective in writing the article?
a. objectivity b. authority c. accuracy d. availabilty
4. Which criteria of quality information includes some information about the date of the material being publish?
a. coverage b. currency c. objectivity d. authority
5. What do you call the words or phrases that appear below the search bar where you are typing your keywords?
a. Search terms b. Search results c. Search engine d. Search suggestions
6. What do you call on the keywords you type in the search bar?
a. Search terms b. Search results c. Search keywords d. Search suggestions
7. What do you call the rights enjoyed by the owner of an artistic or literary work?
a. periodical b. copyright c. registration d. lithography
8. What is the duration of copyright protection in the Philippines?
a. Copyright lasts during the lifetime of the author up to 100 years after his death.
b. Copyright lasts during the lifetime of the author up to 50 years after his death.
c. Copyright lasts during the lifetime of the author and passes through a son or any family member
d. Copyright lasts during the lifetime of the author up to 150 years after his death
9. What is the basic penalty provided by the Philippine law for copyright infringement?
a. Imprisonment up to 6 years plus fine ranging from 500,000 to 1,500,000 pesos
b. Imprisonment between 1 to 3 years plus fine ranging from 50,000 to 150,000 pesos
c. Imprisonment of 3 to 5 years plus fine ranging from 50,000 to 150,000 pesos
d. Imprisonment up to 9 years plus fine ranging from 500,000 to 1,500,000 pesos
10. What do you call the list of websites displayed after entering a search query in a search engine?
a. Search suggestions b. Search results c. Search links d. Search words
11. Why do search engines use double quotation marks in search queries?
a. To display only exact matches of the search terms b. To show related images, videos, and
documents
c. To display the most recent articles on the search term d. To limit the search to only government
websites
11. How does evaluating the authority of a website help in verifying the credibility of online information?
a. It ensures the information comes from a reliable author or organization
b. It shows how recently the website was created
c. It determines if the content is free to use
d. It ensures the website has colorful graphics and videos
12. Why is checking the currency of an online source important?
a. It helps determine how updated the information
b. It ensures that the author has a professional background
c. It shows if the article is written in a formal tone
d. It prevents the use of government-controlled sources
13. What role do search engines play in retrieving online information?
a. They provide direct access to books and journals
b. They organize and rank web pages based on keywords
c. They filter information based on a user’s preferences
d. They limit access to verified sources only
14. Why do companies rely on computers for managing insurance policies?
a. To automate and process claims more efficiently b. To create advertisements for their
services
c. To generate travel tickets for customers d. To develop websites for social networking
15. How does project management software help businesses in e-commerce?
a. It helps in tracking deadlines, costs, and project progress
b. It is used to process online banking transactions
c. It is mainly used to create promotional advertisements
d. It monitors employees’ online shopping activities
16. Why is online banking considered both an advantage and a risk in e-commerce?
a. It allows money transfers but increases online security threats
b. It provides an easy way to buy stocks and property
c. It prevents fraud in business transactions
d. It replaces physical banks completely
17. What happens when copyright laws are violated?
a. The creator can file a legal complaint against the infringer
b. The infringer automatically loses internet access
c. The content is permanently removed from the internet
d. The work becomes available for free use by everyone
19. How can you refine a search to find cookie recipes that exclude sugar?
a. Type "recipes cookies -sugar" in the search bar b. Enter "recipes cookies *sugar"
c. Search for "recipes cookies :sugar d. Type "cookies recipes Xsugar"
20. When researching a historical event, how can you ensure the information is accurate?
a. Verify the source and compare with other credible sources
b. Use the first website that appears in the search results
c. Rely only on personal blogs with similar viewpoints
d. Copy and paste information directly without checking
21. What is a good strategy for evaluating the objectivity of an article?
a. Check if the author presents multiple viewpoint b. Ignore the advertisements on the webpage
c. See if the article has a professional layout d. Ensure the website is colorful and engaging
22. How can you determine the credibility of a website's content?
a. Check if the article provides in-depth and factual information
b. Look for promotional advertisements within the article
c. Ensure the author is affiliated with a business
d. See if the website is linked to a government agency
23. What is the best action if you're unsure about an online article’s accuracy?
a. Compare it with other credible sources b. Use it immediately for research
c. Avoid verifying the author's credentials d. Ignore the publication date
24. Which browser setting should you disable to prevent advertisers from tracking your activity?
a. Save third-party cookies and website data
b. Enable pop-up ads for customized offers
c. Deselect "Do not allow any site to track my physical location"
d. Use JavaScript to load interactive features
25. How do web browsers help users find information efficiently?
a. They provide a search box to enter keywords b. They block all pop-up ads by default
c. They store private data automatically d. They rank paid websites higher than free ones
26. Why is the date a webpage was last updated important when evaluating its accuracy?
a. It shows how recent the information is b. It proves the author’s expertise
c. It determines if the website is secure d. It helps identify the publisher
27. Why is using an alias or codename online recommended for security?
a. It protects your real identity from cyber threats b. It allows you to bypass firewalls
c. It enables you to impersonate others d. It automatically encrypts online data
28. Which action best improves Wi-Fi security at home?
a. Rename the router and create a strong password b. Enable JavaScript in all emails
c. Save passwords automatically on all devices d. Allow public access to the network
29. What is the most important factor when choosing between POP3 and IMAP for email configuration?
a. The ability to access emails from multiple devices b. The need for fewer spam emails
c. The ability to send larger attachments d. The requirement for fewer ads
30. What is the best long-term solution if important emails keep going to the spam folder?
a. Mark them as "Not Spam" and add the sender to the contact list
b. Delete all spam emails daily
c. Ignore the issue and manually move emails to the inbox
d. Change your email provider immediately
a. b. c. d.
32. Which one is a country level domain name?
a. .com b. .ph c. @gmail d. .edu
33. Following are tips to avoid copyright infringement except______?
a. Use images from public domain b. Copy an article and publish as your own
c. Receive permission from the author d. Give credit to the author
34. ThreeGP@bybuzz.com.sg What is the top level domain of the given email address?
a. ThreeGP b. com c. . @bybuzz d. .sg
35. In an office or organization, who is tasked to define the access rights of employees in every computer inside a
network?
a. Anti-virus b. Manufacturer c. Site administrator d. Online Tracker
36. Which part of an e-mail address refers to the name of the person’s email account?
a. domain b. username c. password d. verification e-mail
37. Why is writing a subject line in an email important?
a. It summarizes the purpose of the email b. It allows the email to be received faster
c. It includes instructions for contacting the sender d. It automatically classifies the email as important
38. How do computers improve stock exchange operations?
a. They allow users to buy and sell stocks online b. They create financial reports for businesses
c. They generate market surveys for investors d. They block fraudulent stock transactions
39. What is the purpose of using email and project networking in business?
a. To help teams collaborate and manage projects online b. To create secure bank accounts
c. To improve internet browsing speed d. To prevent employees from accessing social
media
40. What is the possible risk if information security is ignored?
a. Hackers may steal sensitive data from systems b. Passwords will expire automatically
c. Computers will stop connecting to the internet d. Security software will become unusable
41. Which security setting helps protect email accounts from hacking?
a. Encrypting all synced data b. Allowing pop-ups and advertisements
c. Using simple, easy-to-remember passwords d. Disabling spam filters
42. What is one major disadvantage of online banking?
a. It increases the risk of identity theft and fraud b. It eliminates the need for personal financial
advisors
c. It slows down internet connection speed d. It prevents users from making international
transactions
43. How do you send an email to multiple recipients at the same time?
a. Enter multiple email addresses in the "To" box separated by commas
b. Send individual emails with the CC address
c. Select all email addresses in the BCC box
d. Click "Compose" and add all emails in the subject line
44. Which feature allows you to change the formatting of your email?
a. Font and text formatting toolbar b. Address bar
c. Inbox search bar d. Spam filter settings
45. How can you attach a document to an email before sending it?
a. Click the attachment (paperclip) icon b. Type the file name in the subject line
c. Copy and paste the document into the email body d. Drag the file into the spam folder
46. What is the primary reason for organizing emails into folders or labels in an email system?
a. To delete unwanted emails automatically
b. To group emails for better retrieval and management
c. To prevent emails from being sent to spam
d. To make emails take up less storage space
47. A user receives an email with an attachment but is unable to open it due to file format incompatibility. What
should they do first?
a. Delete the email immediately
b. Request the sender to resend the file in a different format
c. Forward the email to another recipient for help
d. Download a file conversion tool without checking its source
48. If an email client is configured incorrectly, which of the following is a likely consequence?
a. The email account will automatically upgrade to premium
b. The email client may fail to send or receive messages properly
c. The email provider will suspend the account
49. A company is deciding whether to configure its email system for POP3 or IMAP. Which of the following is the
most important consideration?
a. The ability to access emails from multiple devices
b. The number of spam emails received
c. The need for more advertisements in emails
d. The ability to send larger email attachments
50. A user frequently receives important emails in their spam folder. What is the best long-term solution?
a. Marking the emails as “Not Spam” and adding the sender to the contact list
b. Deleting all emails in the spam folder daily
c. Ignoring the issue and manually moving the emails to the inbox
d. Changing the email provider immediately